ISCWSA 2019 - International Symposium on Cryptology, Watermarking , Steganography and their Applications
Date2019-05-29 - 2019-05-31
Deadline2019-05-20
VenueGhana Technology University College, Accra Ghana, Ghana
KeywordsComputing security cyber; iot; Computational Modelling; Applications; forensics; crypp
Websitehttps://icsiot.ghsociety.org
Topics/Call fo Papers
Call for Papers for May 2019: 2019 ISCWSA International Symposium on Cryptology, Watermarking , Steganography and their Applications
International Symposium on Cryptology, Watermarking , Steganography and their Applications ISCWSA 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are
Access Control
Anonymity & Pseudonymity
Applied Cryptography
Attacks & Malicious Code
Authentication, Identification
Biometrics
Block & Stream Ciphers
Blockchain Security and Privacy
Cryptographic Algorithms and Primitivess
Cryptographic Protocols
Cyberphysical Security
Data and Application Security
Data and Computation Integrity
Data Protection
Denial of Service Protection
Embedded System Security
Formal Methods for Security
Hash Functions
Identity Management
Key Management
Language-Based Security
Malware Analysis and Detection
Network Security
Security and Privacy for Big Data
Security and Privacy in the Cloud
Security in Content Delivery
Security in Crowdsourcing
Security in Grid Computing
Security in the Internet of Things
Security in Location Services
Security in Pervasive Systems
Security in Social Networks
Sensor Network Security
Trust Management
Usable Security
Virtual Private Networks
Wireless and Mobile Security
Peer-to-Peer Security & Privacy
Privacy-Enhancing Technologies
Public Key Cryptography
Secure Distributed Computing
Security Architectures
Security Metrics
Security Models
Security Policies
Cyber-Physical System
Cryptographic Algorithms
Trust Management
Attacks and Defenses
Authentication
Stream Cipher
Block Cipher
Key Management
Block Chain
Bitcoin
Security and Privacy
Public Key Infrastructure (PKI)
Quantum Cryptography
ABE, KDE
Cyber Security
Web Security
Android Security
FUZZY LOGIC-based Information Security Systems
Vulnerability Assessment
Cyber Forensic
Secure Techniques using AI
Secure Techniques for Big Data
Security in Image and Computer Vision
Honeypot
FOBO, NOMO
Authentication, Copyright protection, DRM, and forensic watermarking
Channel coding techniques for watermarking
Convolutional neural networks (CNN) and deep learning
Combination of data hiding and cryptography
Digital image and media forensics and anti-forensics
Document Security
Information theoretic, stochastic and capacity aspects of data hiding
Large-scale experimental tests and benchmarking
Media forensics use-cases, methodologies and tools
Statistical and perceptual models of multimedia content
Reversible data hiding
Robust perceptual hashing
Security issues, including attacks and counter-attacks
Steganography and steganalysis
Source identification
Visual cryptography and secret image sharing
Identity Management
Multimedia Watermarking for DRM
Fragile Watermarking for content authentication
Chaotic maps for security of Multimedia applications
Information hiding and cryptography
New applications of digital watermarking
Digital forensics for multimedia data
Protection systems against personal identity theft
Reversible watermarking
Integrity verification of multimedia content
Security analysis of watermarking algorithms
Biometrics for multimedia
Attacks to watermarking systems
Benchmarking of watermarking
Multimedia fingerprinting
Steganography and steganalysis
Mathematical modeling of embedding and detection
Information theoretic, stochastic aspects of data hiding
Security issues, including attacks and counter-attacks
Combination of data hiding and cryptography
Optimum watermark detection and reliable recovery
Estimation of watermark capacity
Channel coding techniques for watermarking
Large-scale experimental tests and benchmarking
New statistical and perceptual models of multimedia content
Reversible data hiding
Data hiding in special media
Data hiding and authentication
Steganography and steganalysis
Digital multimedia forensics & anti-forensics
Copyright protection, DRM, forensic watermarking
Visual cryptography & secret image sharing
Security based on human vision system
Information hiding techniques
Studies regarding the use of information hiding in cybercrime
Analysis of cybercrime cases related to CUIng
Large scale coordinated actions by LEAs from CUIng perspective
New steganographic & steganalysis methods
Local, air-gapped, and network covert channels
Novel countermeasures against information hiding techniques: detection, prevention, limitation
Evasion, obfuscation and anti-forensics techniques used by cybercriminals
Traffic type obfuscation techniques e.g. traffic morphing
Masking network attacks with another types of threats
Hiding covert communication within network attacks e.g. DDoS, SPAM, etc.
Impersonation of one cybercriminals groups by the other
Underground marketplaces and their business models
Botnet analysis from CUIng perspective
Methods for botnet detection and mitigation from CUIng perspective
Banking Trojans from CUIng perspective
IoT-botnets from CUIng perspective
Privacy enhancing techniques
Analysis of underground environments
Legal and technical aspects of Darknet research
Cybercrime and CPS from CUIng perspective
Future scenarios in cybercrime from CUIng perspective
Aspects and methods for sharing strategic intelligence
Abusing legitimate cloud-based services for masking criminal activities
Abusing legitimate social media services for masking criminal activities
Novel applications of information hiding in networks
Political and business issues related to network steganography
Information hiding in multimedia services
Digital forensics
Network communication modelling from the viewpoint of steganography
and steganalysis
New methods for detecting and eliminating network steganography
etc
Proceedings of full papers of International Symposium on Cryptology, Watermarking , Steganography and their Applications ISCWSA 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.
International Symposium on Cryptology, Watermarking , Steganography and their Applications ISCWSA 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are
Access Control
Anonymity & Pseudonymity
Applied Cryptography
Attacks & Malicious Code
Authentication, Identification
Biometrics
Block & Stream Ciphers
Blockchain Security and Privacy
Cryptographic Algorithms and Primitivess
Cryptographic Protocols
Cyberphysical Security
Data and Application Security
Data and Computation Integrity
Data Protection
Denial of Service Protection
Embedded System Security
Formal Methods for Security
Hash Functions
Identity Management
Key Management
Language-Based Security
Malware Analysis and Detection
Network Security
Security and Privacy for Big Data
Security and Privacy in the Cloud
Security in Content Delivery
Security in Crowdsourcing
Security in Grid Computing
Security in the Internet of Things
Security in Location Services
Security in Pervasive Systems
Security in Social Networks
Sensor Network Security
Trust Management
Usable Security
Virtual Private Networks
Wireless and Mobile Security
Peer-to-Peer Security & Privacy
Privacy-Enhancing Technologies
Public Key Cryptography
Secure Distributed Computing
Security Architectures
Security Metrics
Security Models
Security Policies
Cyber-Physical System
Cryptographic Algorithms
Trust Management
Attacks and Defenses
Authentication
Stream Cipher
Block Cipher
Key Management
Block Chain
Bitcoin
Security and Privacy
Public Key Infrastructure (PKI)
Quantum Cryptography
ABE, KDE
Cyber Security
Web Security
Android Security
FUZZY LOGIC-based Information Security Systems
Vulnerability Assessment
Cyber Forensic
Secure Techniques using AI
Secure Techniques for Big Data
Security in Image and Computer Vision
Honeypot
FOBO, NOMO
Authentication, Copyright protection, DRM, and forensic watermarking
Channel coding techniques for watermarking
Convolutional neural networks (CNN) and deep learning
Combination of data hiding and cryptography
Digital image and media forensics and anti-forensics
Document Security
Information theoretic, stochastic and capacity aspects of data hiding
Large-scale experimental tests and benchmarking
Media forensics use-cases, methodologies and tools
Statistical and perceptual models of multimedia content
Reversible data hiding
Robust perceptual hashing
Security issues, including attacks and counter-attacks
Steganography and steganalysis
Source identification
Visual cryptography and secret image sharing
Identity Management
Multimedia Watermarking for DRM
Fragile Watermarking for content authentication
Chaotic maps for security of Multimedia applications
Information hiding and cryptography
New applications of digital watermarking
Digital forensics for multimedia data
Protection systems against personal identity theft
Reversible watermarking
Integrity verification of multimedia content
Security analysis of watermarking algorithms
Biometrics for multimedia
Attacks to watermarking systems
Benchmarking of watermarking
Multimedia fingerprinting
Steganography and steganalysis
Mathematical modeling of embedding and detection
Information theoretic, stochastic aspects of data hiding
Security issues, including attacks and counter-attacks
Combination of data hiding and cryptography
Optimum watermark detection and reliable recovery
Estimation of watermark capacity
Channel coding techniques for watermarking
Large-scale experimental tests and benchmarking
New statistical and perceptual models of multimedia content
Reversible data hiding
Data hiding in special media
Data hiding and authentication
Steganography and steganalysis
Digital multimedia forensics & anti-forensics
Copyright protection, DRM, forensic watermarking
Visual cryptography & secret image sharing
Security based on human vision system
Information hiding techniques
Studies regarding the use of information hiding in cybercrime
Analysis of cybercrime cases related to CUIng
Large scale coordinated actions by LEAs from CUIng perspective
New steganographic & steganalysis methods
Local, air-gapped, and network covert channels
Novel countermeasures against information hiding techniques: detection, prevention, limitation
Evasion, obfuscation and anti-forensics techniques used by cybercriminals
Traffic type obfuscation techniques e.g. traffic morphing
Masking network attacks with another types of threats
Hiding covert communication within network attacks e.g. DDoS, SPAM, etc.
Impersonation of one cybercriminals groups by the other
Underground marketplaces and their business models
Botnet analysis from CUIng perspective
Methods for botnet detection and mitigation from CUIng perspective
Banking Trojans from CUIng perspective
IoT-botnets from CUIng perspective
Privacy enhancing techniques
Analysis of underground environments
Legal and technical aspects of Darknet research
Cybercrime and CPS from CUIng perspective
Future scenarios in cybercrime from CUIng perspective
Aspects and methods for sharing strategic intelligence
Abusing legitimate cloud-based services for masking criminal activities
Abusing legitimate social media services for masking criminal activities
Novel applications of information hiding in networks
Political and business issues related to network steganography
Information hiding in multimedia services
Digital forensics
Network communication modelling from the viewpoint of steganography
and steganalysis
New methods for detecting and eliminating network steganography
etc
Proceedings of full papers of International Symposium on Cryptology, Watermarking , Steganography and their Applications ISCWSA 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.
Other CFPs
Last modified: 2019-04-28 17:28:40